• Title/Summary/Keyword: Access Method

Search Result 3,423, Processing Time 0.033 seconds

Performance Evaluation of the Common Channel Access Method in CDMA Packet Service System (CDMA 패킷 서비스 시스템에서 Common Channel Access 방법의 성능 평가)

  • Lee, Kang-Won
    • IE interfaces
    • /
    • v.17 no.3
    • /
    • pp.294-304
    • /
    • 2004
  • In the IS-95 packet service system, the radio channels are generally classified into the dedicated and common traffic channels. In this paper, the performance of the common traffic channel access method is evaluated using simulation. The simulation results are compared with those of random access method. Simulation results show that the capacity can be increased up to 25% by applying the proposed common channel access method. The delay problem and variance of BER are also discussed.

Random Access Method for the IEEE 802.16 Networks (IEEE 802.16 망을 위한 랜덤 액세스 기법)

  • Kim, Myeong-Hwan;Kook, Kwang-Ho;Lee, Kang-Won;Kim, Young-Il
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.11-19
    • /
    • 2008
  • To enhance the performance of the IEEE 802.16 broadband wireless access system, it is necessary to improve the efficiency of the radio link. The efficiency of the uplink can be improved by using more efficient random access method. As new random access methods, we propose a RA_NBRM method which is based on the number of bandwidth request messages and a RA_CRA method which is based on the conflict resolution algorithm. The simulation results show that the performance of the new methods is superior to that of the existing binary exponential backoff method.

  • PDF

Design of a Simulation Model for Integrated Access Control (통합 접근 제어를 위한 시뮬레이션 모델 설계)

  • Lee Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.49-54
    • /
    • 2004
  • Rule-based access control can not completely be replaced by identity-based access control. Neither can role-based access control be a merger of identity-based access control and rule-based access control, but can be used complementarily for each other. In this paper, is proposed a simulation model designed for a new integrated access control method that has been created by means of integrating the existing access control methods. The integrated access control method is equipped with security, integrity and flow control and can easily accomodate the requirements for access control from role-based corporate bodies. The simulation model proposed in this paper can be applied for real working system designs.

  • PDF

Access Control Method and Key Management Method for H.264/SVC (H.264/SVC에 대한 접근 제어 방법 및 키 관리 방법)

  • Cho, Tae-Nam;Yong, Seung-Lim
    • The KIPS Transactions:PartC
    • /
    • v.17C no.5
    • /
    • pp.415-426
    • /
    • 2010
  • CAS is an access control system by which only legal users can access contents. IPTV is a spotlighted system that uses CAS. H.264/SVC is a coding standard that provides a scalable coding method by which users who are in various network environments and have various devices can receive the contents. In this method, the contents are coded in a layered structure to make users choose the quality of the receiving contents. Therefore, contents provider should be able to control users to access only appropriate contents according to their subscriptions. The structure of CAS being employed in many applications is not suitable to control access for H.264/SVC. In this paper, we provide an efficient access control method and a key management method for H.264/SVC contents using CAS.

The Access Network Architecture for BcN Adapted (BcN 적합형 액세스네트워크 구조)

  • Lee, Sang-Moon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.121-124
    • /
    • 2007
  • This article describes a function and structure of access network equipment under BcN environment. Access network until now have constructed separately to offer voice, data service. However, simplifies network structure, function that can do traffic concentration, subscriber certification, individual charging, QoS according to service and routing is required in BcN. In this paper, compare method offering by separate system with existing access network and method that offer integrating function inside system for structure of suitable access network to BcN and search structure of access network equipment for desirable access network of hereafter. Composition of this paper is as following. In Chapter 2, establishment history and structure of access network until present. In Chaprte 3, define suitable requirement and functions to BcN. And compare structure for access net work that is new with present. Last Chapter 4, suggests direction of structure of BcN access network and concludes conclusion.

  • PDF

A Role-Based Access Control System API Supporting External Authority Interface

  • Ma, Jin;Kim, Hyunah;Park, Minjae
    • Journal of Internet Computing and Services
    • /
    • v.19 no.2
    • /
    • pp.27-32
    • /
    • 2018
  • In industries that are operating various enterprise systems, new systems are integrated and operated in accordance with each period. In particular, when a new system is to be integrated, one of the major considerations is the single sign-on part for integrating and operating the authentication. To implement this authority system using role-based access control method, an extension method for access control method is needed. Therefore, in this paper, we design an extended role-based access control model for interworking with legacy authority system and provide its APIs. The extended role-based access control model is a model in which external authority information, which holds authority information in the authority information, is added. And we describe operations that the REST Web APIs are based on these models. In this paper, the method is described in the back-end APIs and can be implemented as an operation of an extended role-based access control system based on the method.

Estimating Walk Access and Auto Access Ridership for Transit Demand Forecast (대중교통수요예측을 위한 보행접근 및 승용차접근 잠재수요의 추정)

  • Yun, Seong-Soon;Yun, Dae-Sic
    • Journal of Korean Society of Transportation
    • /
    • v.21 no.6
    • /
    • pp.43-55
    • /
    • 2003
  • This paper presents a new method for estimating potential transit ridership residential population and number of employees that have accesses to transit services. A standard procedure that can be used to determine transit accessibility by pedestrians ad automobiles are developed to improve its transit demand forecasting capability. The analysis results are compared with those from the traditional buffer method as well as the network ratio method. It was found that the proposed method is more accurate than the traditional methods. The new method can be used to better estimate the "Walk Access" transit trips and "Auto Access" transit trips in the Mode Choice Model.

An Automatic AP Connections Scheme using iBeacon (iBeacon을 이용한 AP 자동접속 방안)

  • Nam, ChoonSung;Shin, DongRyeol
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • There are two kinds of wireless network access to a certain place by using smart devices - 1) open (anonymous) - access and 2) user-authorized access. The open-access is a non-authorization connection method which does not need to require Smart device's user authorized information. It means open-access use only user's SSID (Service Set Identifier) information to access the wireless AP devices following public wireless network standard. This access mechanism is not suitable to use all of public wireless networks because users have to get all wireless network information around them. As a result, huge data for smart devices should be one of the most critical overload problems for them. Secondly, the user-authorized access method uses wireless network information (SSID and password) chosen by the users. So, the users have to remember and use the network access information data manually whenever accessing the network. Like open-access, this access method also has the operational and inconvenient problem for the users - manually inputting access information whenever connecting to the network. To overcome this problem in both schemes, we propose two improved wireless network access methods: 1) the implementation of automatic AP connection mechanism using user-authorization and iBeacon messages, and 2) SSID registration form for public wireless networks.

The Design and Performance analysis of a Process Migration Facility in a Distributed System (분산 시스템에서 프로세스 이주 기능의 설계와 성능 평가)

  • 엄태범;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.7
    • /
    • pp.656-665
    • /
    • 1992
  • In this paper, the performance of the various multiple access techniques for the mobile computer network has been studiedi in the consideration of the charactersitics of the mobile cimmunication channel. In the case of the hidden node occurring. It could be seen that the performance of the code division multiple access (CDMA) technique with simultaneous access function is better than that of the other packet access methods such as carrier sendsed multiple access (CDMA), busy tone multiple access (BTMA) and idle signal multiple access (ISMA) in the view of the throughput and mean delay time. Also, it has been shown that the performance of the CDMA method is superior to that of other packet access techniques such as multiple access (CSMA), etc. when the fading effect or impulsive noise exists in the mobile channel, Especially, in the case of the distributed mobile network it has been shown that the receivertransmitter based CDMA method using the characteristics of CDMA effectively has better throughput and less mean delay time than the commontransmitter based CDMA technique.

  • PDF

Role-Behavior Based Access Control on Mobile Agent System for Workflow Management System (워크플로우 응용을 위한 이동 에이전트 시스템에의 역할-행위 기반 접근통제 적용)

  • Shin, Wook;Lee, Dong-Ik;Yoon, Seok-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.3
    • /
    • pp.11-28
    • /
    • 2000
  • In these days it is rapidly increasing that multi-user, multi-layered commercial software developments for companies or public institutions. Security services are necessary for most of systems and the access control service is the essential of security services. Current access control methods that are used as access control policies are classified as Discretionary Access Control Mandatory Access Control and Role Based Access Control. However there are some inefficiencies when those methods are applied to current multi-user, multi-layered systems. Therefore it is required that a new access control method that takes complex system resources into account from the side of policy. In this paper extending previous Role Based of 'Behavior' and a basic model of the method. And we simply implement the method on the mobile agent based workflow management system that is a representative example of multi-user. multi-layered softwares and shows implementation results to tap possibilities of real-world application.